Sciweavers

8030 search results - page 1255 / 1606
» User Interface
Sort
View
126
Voted
SIGIR
2010
ACM
15 years 5 months ago
Predicting escalations of medical queries based on web page structure and content
Logs of users' searches on Web health topics can exhibit signs of escalation of medical concerns, where initial queries about common symptoms are followed by queries about se...
Ryen W. White, Eric Horvitz
DKE
2006
122views more  DKE 2006»
15 years 5 months ago
Sampling, information extraction and summarisation of Hidden Web databases
Hidden Web databases maintain a collection of specialised documents, which are dynamically generated in response to users' queries. The majority of these documents are genera...
Yih-Ling Hedley, Muhammad Younas, Anne E. James, M...
128
Voted
COMCOM
2007
123views more  COMCOM 2007»
15 years 5 months ago
Seamless transport service selection by deploying a middleware
Despite the many research efforts at the transport layer (SCTP, DCCP, etc.), new innovations in that area hardly ever make it into the TCP/IP stacks of standard end systems. We b...
Sven Hessler, Michael Welzl
168
Voted
MMS
2008
15 years 5 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
INTR
2007
100views more  INTR 2007»
15 years 5 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
« Prev « First page 1255 / 1606 Last » Next »